Integrating encryption techniques for secure data storage in the cloud

[1]  VasilakosAthanasios,et al.  Security and privacy challenges in mobile cloud computing , 2017 .

[2]  Xiaohui Liang,et al.  Cryptographic Public Verification of Data Integrity for Cloud Storage Systems , 2016, IEEE Cloud Computing.

[3]  Yulei Wu,et al.  Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[4]  Kim-Kwang Raymond Choo,et al.  Biometrics in the Cloud: Challenges and Research Opportunities , 2017, IEEE Cloud Computing.

[5]  Surjeet Dalal,et al.  A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: A Revolutionary Approach , 2018, J. Cyber Secur. Mobil..

[6]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[7]  Jun Wu,et al.  Secure Transmission in Multi-Cell Multi-User Massive MIMO Systems With an Active Eavesdropper , 2019, IEEE Wireless Communications Letters.

[8]  Ting Wu,et al.  Large universe attribute based access control with efficient decryption in cloud storage system , 2018, J. Syst. Softw..

[9]  A. P. Shanthi,et al.  Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment , 2015, Inf. Secur. J. A Glob. Perspect..

[10]  Li Xu,et al.  A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[11]  Xiaochun Cheng,et al.  Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

[12]  Geyong Min,et al.  Data-Driven Information Plane in Software-Defined Networking , 2017, IEEE Communications Magazine.

[13]  GaniAbdullah,et al.  The rise of "big data" on cloud computing , 2015 .

[14]  Mosleh M. Abu-Alhaj,et al.  Cloud Data Auditing Techniques with a Focus on Privacy and Security , 2017, IEEE Security & Privacy.

[15]  Chunyuan Zhang,et al.  HASG: Security and efficient frame for accessing cloud storage , 2018, China Communications.

[16]  Richard O. Sinnott,et al.  TruXy: Trusted Storage Cloud for Scientific Workflows , 2017, IEEE Transactions on Cloud Computing.

[17]  Benjamin Fabian,et al.  Secret Sharing for Health Data in Multi-provider Clouds , 2013, 2013 IEEE 15th Conference on Business Informatics.

[18]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[19]  Manju Suresh,et al.  Hardware Implementation of Blowfish Algorithm for the Secure Data Transmission in Internet of Things , 2016 .

[20]  Adeel Anjum,et al.  A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..

[21]  Hao Yan,et al.  A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[22]  Zahir Tari,et al.  Security and Privacy in Cloud Computing: Vision, Trends, and Challenges , 2015, IEEE Cloud Computing.

[23]  Qiang Wei,et al.  Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment , 2018, Wirel. Commun. Mob. Comput..

[24]  Bharat S. Rawal Proxy re-encryption architect for storing and sharing of cloud contents , 2020, Int. J. Parallel Emergent Distributed Syst..

[25]  K. Suveetha,et al.  Ensuring Confidentiality of Cloud Data using Homomorphic Encryption , 2016 .

[26]  Joel J. P. C. Rodrigues,et al.  SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.

[27]  AlamMasoom,et al.  A survey of cloud computing data integrity schemes , 2017 .

[28]  Shahid Mumtaz,et al.  ECOSECURITY: Tackling Challenges Related to Data Exchange and Security: An Edge-Computing-Enabled Secure and Efficient Data Exchange Architecture for the Energy Internet , 2019, IEEE Consumer Electronics Magazine.

[29]  Samee Ullah Khan,et al.  DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party , 2017, IEEE Transactions on Cloud Computing.

[30]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[31]  Joe Weinman,et al.  The Economics of the Hybrid Multicloud Fog , 2017, IEEE Cloud Computing.

[32]  Yulei Wu,et al.  An Architecture for Accountable Anonymous Access in the Internet-of-Things Network , 2018, IEEE Access.

[33]  Nan Nan,et al.  An Operation Control Strategy for the Connected Maglev Trains Based on Vehicle-Borne Battery Condition Monitoring , 2018, Wirel. Commun. Mob. Comput..

[34]  Ying Wang,et al.  Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..